Senior Security Operations Analyst (Threat)
Hours: Closing Date: Thu, 28 Aug 2025
We are recruiting for a Senior Security Operations Analyst, to join our Security team. If you enjoy working in a fast paced and agile environment, helping inform key decisions on our security posture, analysing, assessing, hunting threats, and have a curious and analytical mindset this may be the job for you.
Overview
Not just another building society. Not just another job. We are the fourth biggest building society in the UK and a mutual organisation. We don’t have shareholders; we’re owned by our members. Our colleagues say Skipton is a great place to work, and you could be one of them, bringing with you new ideas on how we can keep customers at the heart of what we do. You will be joining the Security function with over 20 people dedicated to securing our organisation, split over various security disciplines. You will work closely with our Managed Security Service Provider, supplementing this service with your own capabilities such as threat analysis and hunting, supporting incident management processes and maintaining our threat landscape.
What’s In It For You?
* Hybrid and flexible working, with a newly refurbished head office offering a vibrant and collaborative space.
* Annual discretionary bonus scheme.
* 25 days standard annual leave + bank holidays, rising 1 day per year of service to a maximum of 30 days.
* Holiday trading scheme to buy/sell additional annual leave days.
* Matching employer pension contribution (up to 10% per annum).
* Colleague mortgage (conditions apply).
* Salary sacrifice for hybrid & electric car.
* A commitment to training and development.
* Private medical insurance for colleagues.
* 3 paid volunteering days per annum.
* Diverse and inclusive colleague networks (e.g., Carers and Pride Alliance).
What Will You Be Doing?
* Monitor escalated security alerts from our MSSP and MDR service, assess and manage their progress, and work closely with our MSSP/MDR to ensure effective use of SIEM and MDR services and drive process improvements.
* Conduct in-depth analysis of security events to determine impact and severity.
* Correlate data from multiple sources to identify patterns and indicators of compromise (IOCs) and use EDR and SIEM tools to conduct proactive threat hunting.
* Support our incident management process, providing subject matter expertise.
* Maintain, implement, and support documentation; input into creation and maintenance of standards and policies aligned with the current policy framework.
* Maintain and update our threat landscape.
* Train and support junior analysts.
What Do We Need From You?
* Knowledge: Proficiency in incident handling, threat analysis, and security tools; familiarity with network protocols, malware analysis, and log analysis; good knowledge of NIST and MITRE ATT&CK frameworks.
* Experience: Minimum 2 years in a SOC environment; experience using EDR tooling (preferably Sophos); using a Threat Intelligence Platform; interpreting threat intelligence feeds, IOCs, and TTPs; threat hunting across on-premise and cloud environments; dark web monitoring; ability to analyse large data sets, identify anomalies, and deploy countermeasures under pressure; creating scripts or automating processes in Python or other relevant languages.
Qualifications
* Relevant certifications such as CompTIA Security+, CEH, or GIAC (GCIH, GCIA, etc.).
Behaviours
* Strong communication, analytical and teamwork skills.
* Excellent investigative skills, insatiable curiosity, and high personal integrity.
* Self-motivated with a high sense of urgency and the highest ethical standards.
#LI-NP1
#J-18808-Ljbffr